Spoofing can be interpreted as the network security term used for forging.
电子欺骗可以解释成用于伪造的网络安全术语。
The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.
在网络上传输的数据容易受到各种网络攻击,例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截和捕捉回复。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.
如何防范校园网络流行的ARP欺骗攻击,已成为网络管理员与用户高度关注的问题。
This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.
阐述了网络协议欺骗的一般原理,详细分析了ICMP协议及其存在的漏洞。
The ARP spoofing is one of the spoofing on the network, which allows an attacker to redirect the IP packets on a network segment of Ethernet so that he can get the trust of the target host.
ARP协议欺骗是网络欺骗行为之一,它使得攻击者可以重定向一个以太网段上的IP数据报以取得目标主机的信任。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.
基于源地址欺骗的网络攻击已成为当前网络安全最主要的威胁之一。
This article recently on the network against ARP spoofing the larger object for discussion in order to attack the simulation, the host location and infection-related focus on practical tests.
本文针对近期在网络上危害比较大的ARP欺骗技术为讨论对象,以攻击的模拟、感染主机的定位和相关实践性试验等为重点。
According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用于入侵检测,可增强网络抵御IP欺骗攻击的能力。
According to the trace analysis, the real attacker could be found. If this idea is applied in the intrusion detection, the network resistibility under IP spoofing will be reinforced.
通过回溯分析,试图找到发起攻击的攻击者。将状态分析法运用于入侵检测,可增强网络抵御IP欺骗攻击的能力。
应用推荐